Next Article in Journal
Differentiation Between Organic and Non-Organic Apples Using Diffraction Grating and Image Processing—A Cost-Effective Approach
Next Article in Special Issue
Parameter Estimation of SAR Signal Based on SVD for the Nyquist Folding Receiver
Previous Article in Journal
Strategies to Improve Activity Recognition Based on Skeletal Tracking: Applying Restrictions Regarding Body Parts and Similarity Boundaries
Previous Article in Special Issue
Performance Analysis of Satellite Missions for Multi-Temporal SAR Interferometry
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Transmitting Pulse Encoding for Beyond-PRT Retransmitting Deception Jamming Detection in Spaceborne Synthetic Aperture Radar (SAR)

1
Aeronautics Engineering College, Air Force Engineering University, Xi’an 710038, China
2
School of Electronics and Information Engineering, Beihang University, Beijing 100084, China
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(5), 1666; https://doi.org/10.3390/s18051666
Submission received: 12 April 2018 / Revised: 19 May 2018 / Accepted: 21 May 2018 / Published: 22 May 2018

Abstract

:
Retransmitting deception jamming (RDJ) degrades and misleads the Synthetic Aperture Radar (SAR) image interpretation by forming false targets. The beyond-Pulse Repetition Time (PRT) RDJ enlarges the effective jamming area without constraining the jammer location to reduce the spaceborne SAR working effectiveness. In order to detect the beyond-PRT RDJ and enhance the working efficiency in electronic countermeasure environment, the transmitting pulse encoding method for use in spaceborne SAR is proposed based on the geometry and signal models of beyond-PRT RDJ. Optimum binary codes with maximum number of detection windows are determined by the encoding procedure. The detected area is found to be proportional to the code length and the encoding efficiencies of even and odd codes are analyzed. The simulation results validate the effectiveness of the transmitting pulse encoding method for beyond-PRT RDJ detection in spaceborne SAR.

1. Introduction

Spaceborne Synthetic Aperture Radar (SAR) has been widely used in civilian exploration and military surveillance for its all-weather, long time and large-range detection capability [1]. However, the Retransmitting Deception Jamming (RDJ) can significantly degrade the SAR imaging quality and mislead the image interpretation by modulating false target information on the jamming signal [2,3,4,5]. The jammer of traditional RDJ must be located near the nadir of the SAR to cover a large area, because the traditional RDJ uses the current intercept transmitting signal of SAR to contaminate the current echo of protected target. To enlarge the coverage zone of RDJ without constraining the jammer location, the beyond-Pulse Repetition Time (PRT) RDJ was proposed to counter the spaceborne SAR. The beyond-PRT RDJ uses the current intercept transmitting signal to contaminate the subsequent echoes with one or more PRTs time delay. Hence, the jammer location is greater flexible compared with the traditional RDJ [3]. If the beyond-PRT RDJ signal is received by the spaceborne SAR receiver, the satellite will need to refocus on the same scene during the next orbit period. Hence, the beyond-PRT RDJ has negative impact on the working efficiency of spaceborne SAR. As for spaceborne SAR under electronic counter measures environment, the beyond-PRT RDJ detection capability is crucial and necessary.
To date, most of the research and literature has been focused on the unintentional interference detection and suppression [6,7,8]. The typical unintentional interference is narrowband interference (NBI) and wideband interference (WBI) caused by radio broadcast and TV signals which contaminate the SAR image [9,10,11,12]. The amplitude threshold detection was adopted to identify the NBI in the frequency domain where the NBI amplitude will jump at certain range bins [13]. The Kurtosis statistical detection method was proposed to detect NBI in frequency domain using echo data [14]. The negentropy-based statistical test was utilized to detect the WBI in instantaneous spectrum using short-time Fourier transform (STFT) [15]. In essence, the statistical detection methods depend on the non-coherence of interference and echo. However, aforementioned methods are not suitable for RDJ detection for the following reasons. Firstly, the RDJ signal is coherent with echo and the statistical character of echo contaminated with the RDJ signal is barely changed. Secondly, the power of RDJ signal is precisely calculated based on the false target radar cross section (RCS) and is usually smaller than that of the echo. Hence, the amplitude detection is useless for echo with RDJ signal. Thirdly, and most importantly, the unintentional interference is detected and processed only after the echo data is transmitted from satellite to ground center. In contrast to the unintentional interference, the RDJ will make SAR in a near-realtime electronic adversarial environment requiring active jamming detection capability. The RDJ needs to be detected and processed during the transmission and reception of the signal by the satellite to avoid suffering seriously jamming and losing working efficiency.
Multi-channel, Multi-Input and Multi-Output (MIMO) SAR is being increasingly developed. In [16,17,18,19,20,21,22,23], the azimuth multi-channel SAR was proposed for high-resolution and wide-swath. In [20], the sub-band signal synthesizing method for azimuth multi-channel SAR was researched. The multi-channel cancellation method for jamming suppression and the beam-forming method were proposed [22,23]. Based on cross-track MIMO SAR, the beyond-PRT RDJ suppression method was proposed [16]. However, the RDJ detection is not investigated. Besides, the RDJ detection for SAR system partly differs from target detection for radar [24,25,26]. For normal target detection in radar system, the Neyman-Pearson criterion is adopted and the target echoes need to be detected in noise and interference background. In [24], a unifying framework for multi-channel and multidimensional radar in homogenous plus structured interference was built. In [25], an adaptive direction detector was designed in the presence of interference. Compared with target detection, the purpose of RDJ detection is enabling the SAR system to detect the RDJ and perceive the electromagnetic environment.
In this paper, the transmitting pulse encoding method is proposed to detect the beyond-PRT RDJ. Although the beyond-PRT RDJ pulse and target echo pulse are identical, owing to the propagation distance and time delay modulation, the beyond-PRT RDJ signal will lag the target echo signal by some PRTs. By adjusting the transmitting pulse sequence, the beyond-PRT RDJ signal will be detected in the time-domain. In particular, a binary code is utilized to modulate the transmitting pulse sequence, whereby “1” signifies a transmitting pulse and “0” signifies no transmitting pulse. Various codes are researched to detect the beyond-PRT RDJ with arbitrary time delay and with optimum detection efficiency.
This paper is organized as follows: Section 2 presents the spaceborne SAR with beyond-PRT RDJ model and an example of the transmitting pulse encoding method. Section 3 introduces the transmitting pulse encoding method and analyzes the encoding efficiency of odd and even codes. Section 4 presents the results of simulation. Section 5 concludes the paper.
For the convenience of the reader, the following notation is used: SJ represents the beyond-PRT jamming signals. Sr represents the transmitting signal of SAR. Y is the echoes with beyond-PRT RDJ signals. RJ is the slant distance between the jammer and the SAR and RP is the slant distance between the point target and the SAR. MT{ } is the time delay operation of signal matrix. Tc represents the transmitting pulse code and T is the encoding part of Tc. and L is the length of T. Nbest is the number of optimum code. Nd is the total effective detection window of optimum code.

2. Spaceborne SAR Beyond-PRT RDJ Model

2.1. Geometry Model

An illustration of the beyond-PRT RDJ scenario is provided in Figure 1. The arbitrary protected target P is located in front of the jammer J. The location of Q is the outermost point for the jammer and thus, RQ represents the largest effective jamming slant range of jammer J with constant jamming power. The SAR on the satellite S flies along the y-axis (as shown by the dotted line). The RJ and RP represent the slant ranges from the jammer and the protected target to the satellite, respectively.
With traditional RDJ, the jammer must be located closer to the origin O than the protected target P to effectively conceal the location of P. Thus, if the slant range between jammer and satellite is larger than the slant range between protected target and satellite, the traditional RDJ will lose efficacy. However, the beyond-PRT RDJ is utilized to expand the effective coverage of the jammer and so, as Figure 1 shows, the jammer in the beyond-PRT RDJ scenario can be located between P and Q. Accordingly, the jamming detection method needs to continuously detect the jammer in the range (RP, RQ).

2.2. Signal Model

The RDJ model is as follows [2,16]:
S J ( t ) = j [ S r ( t ) δ ( t 2 R J c Δ τ d j ) ] exp { j φ j ( t ) } t = k η + τ 0 τ < η
where Sr(t) is the transmitting signal, RJ is the single propagation slant range from jammer to satellite, Δ τ dj represents the time delay of the j-th false target, φ j ( t ) denotes the j-th false target modulating phase. η and τ represent the azimuth and range components of time t, respectively. In practice, the linear frequency modulation (LFM) signal is adopted as the transmitting signal. Hence, the baseband signal of RDJ can be expressed as a function of the azimuth and range components as follows:
S J ( τ , η ) = ω r { τ 2 R J ( η ) c + Δ τ d T a } ω a ( η η J ) × exp { j π K r ( τ 2 R J ( η ) c + Δ τ d T a ) 2 } × exp { j 2 π f 0 2 R J ( η ) c } × exp { j 2 π f 0 2 Δ R ( η ) c }
where Ta is the PRT, Kr is the frequency modulation rate, the transmitting signal center frequency is f0, ω r { · } and ω a { · } represent the pulse envelope of range and azimuth components respectively, · indicates the modulus operation which presents the time delay of beyond-PRT RDJ and Δ R is the instantaneous difference in slant ranges of jammer and protected target, which represents the phase modulation of beyond-PRT RDJ.
In a scenario given in Figure 1, the jammer needs to conceal the protected target P. Accordingly, the time delay and the instantaneous slant range difference or modulation phase must satisfy the following equations:
{ Δ τ d = 2 R P ( η m T a ) c + m T a 2 R J ( η ) c n Δ R ( η ) = R P ( η m T a ) R J ( η )
With traditional RDJ, the time delay difference Δ τ d must greater than 0 and the m is equal to 0. This means that RJ must be less than Rp and thus, the jammer must be located closer to the origin O than the protected target. Hence, the protected area is limited by the jammer location. However, for the beyond-PRT RDJ, the m can be a non-zero integer to ensure that Δ τ d is greater than 0 and RJ can be greater than Rp.
The transmitting signal can be expressed in matrix form as follows:
S r = [ s 1 , s i , , s N ] T
where the vector si represents the i-th sample of the azimuth component of the signal and there are N samples in total. Supposing that each azimuth signal has M samples, the azimuth signal si is as follows:
s i = [ s i ( 1 ) , , s i ( M ) ] T
The beyond-PRT RDJ can be expressed in matrix form as follows:
S J = M T { E S r } m
where E is the modulation phase vector as follows:
E = [ exp ( j φ 1 ) , , exp ( j φ i ) , , exp ( j φ N ) ] T = [ exp ( j 4 π Δ R 1 λ 0 ) , , exp ( j 4 π Δ R i λ 0 ) , , exp ( j 4 π Δ R N λ 0 ) ] T
where ⊕ is the Hadamard product and MT{A}m represents the time delay operation of jammer, whereby each row of matrix A is downwards shifted by m − 1 rows and the first m − 1 rows are replaced with zero vectors. Thus, the time delay operation of jammer is as follows:
M T { A N M } m = [ 0 11 0 1 M 0 ( m 1 ) 1 0 ( m 1 ) M a 11 a 1 M a ( N m + 1 ) 1 a ( N m + 1 ) M ]
Hence, the jamming signal SJ is as follows:
S J = [ O 1 O m 1 s 1 e j φ 1 s N m + 1 e j φ N m + 1 ] T
The rank of SJ, R(SJ), is less than N. Ignoring the impact of noise, the echo Y with beyond-PRT RDJ is as follows:
Y = S r + S J = [ s 1 s m 1 s m + s 1 e j φ 1 s N + s N m + 1 e j φ N m + 1 ]

2.3. Example of Transmitting Pulse Encoding

As can be seen in Figure 2, the m-th transmitting pulse is instead not transmitted as the corresponding element of the binary code is 0 for example. Hence, there will not be any legitimate target echo pulses in the effective detection window. However, owing to the time delay modulation and the propagation delay, the first pulse of beyond-PRT RDJ is received in the effective detection window as shown in Figure 2. Although both the location and time delay modulation of jammer are unknown in practical applications, the slant ranges of the detected area, where the jammer may be placed, can be calculated in advance. For example, the detected area is between RP and RQ.
The binary code TC consists of two parts: the first part, consisting of L bits, are used for detection and the second part is normal transmission with NL bits of “1”. The code word is expressed as follows:
T C = [ T ( 1 ) T ( L ) L 1 1 N L ] T
where T(i) is the i-th detection element, which can take on a value of 1 or 0. Hence, the echoes utilized transmitting pulse code are given as follows:
Y C = [ T ( 1 ) s 1 T ( L ) s L L s L + 1 s N N L ] T
In the above example, we supposed that the transmitting code T is [1010]. The beyond-PRT RDJ detection is shown in Figure 3.
As Figure 3 shows, when the time delay of the beyond-PRT RDJ is one PRT, there are two effective detection windows for the supposed transmitting code T. When the time delay of beyond-PRT is two PRTs, there are no effective detection windows which mean that the transmitting code T may not be effective in RDJ detection for all potential time delays. Hence, the optimum code needs to be determined in different code length.
There are two requirements of the optimum codes. First, there should be at least one effective detection window for each time delay of the beyond-PRT RDJ to ensure the SAR can continuously detect the beyond-PRT RDJ with any potential time delay. Second, the summary of effective detection window number in each time delay is maximum, which make sure the code own the maximum average detection quantity. Moreover, the number of the optimum codes number in different code length is the more the better. Because that the diversity of the optimum code means that the jammer is hard to recognize the time sequence of transmitting pulse.

3. Transmitting Pulse Encoding Method and Analysis of Encoding Efficiency

3.1. Encoding Method

Based on the two standards for the optimum code, the encoding method is introduced and the optimum codes corresponding different length are got and shown in this section. The binary encoding method is adopted and the code length is determined in proportion with the detected area. So, if the jammer is located within the area defined by slant range interval [RN, RQ], where RN is the nearest slant range of detected area (usually equal to RP) and RQ is the maximum slant range of the jammer, the code length can be determined as follows:
L = 2 ( R Q R N ) c T
where · symbolizes the ceiling function. Supposing that the pulse must be transmitted in the first azimuth time, this means that T(1) is equal to 1. Then, the remaining L − 1 bits can form 2(L−1) codes, each corresponding to a decimal integer d in the range [0, 2(L−1)-1]. The optimum codes are selected in the procedure detailed as follows:
  • Step 1: Initialization of transmitting code T and jamming code WJ.
    Let d = 0 and T = B(d) which converts d from decimal to binary. Let WJ = T.
  • Step 2: Right-shift operation on jamming code WJ.
The right-shift number m denoted in (3) represents that the jamming signal lags the target echo signal by m PRTs. The maximum number of right-shifts that can be performed is L − 1. The right-shift operation is as follows:
W J = W J 1
  • Step 3: Exclusive OR operation of WJ and T.
T is periodically extended to match the length of the right-shifted jamming codes WJ. The exclusive OR operation is as follows:
W E = W J   E o r   T
  • Step 4: Obtaining the beyond-PRT RDJ detection result WD.
Determine WD as follows:
W D ( i ) = { 0    W E ( i ) T ( i ) 0 1    W E ( i ) T ( i ) = 1
where 1 represents successful detection of jamming and 0 represents unsuccessful detection of jamming. Thus, the number of 1 element in WD represents the number of effective detection windows, denoted by Ns.
  • Step 5: Judging the effectiveness of transmitting code T.
If Ns is greater than or equal to 1, it means the current T is a valid transmitting code for jamming detection. Then, the current Ns can be stored and the procedure is repeated, starting from Step 2, to obtain other shifted jamming words WJ. If Ns is equal to 0, it means the current T is an invalid transmitting code for jamming detection. Then, the procedure is repeated, starting from Step 1 with d = d + 1.
  • Step 6: Determining the optimum transmitting pulse codes.
Determine the total number of effective detection windows Nd by summing the effective detection windows Ns for each right-shift of WJ. By comparing the Nd of all transmitting codes T, the optimum transmitting codes can be obtained by selecting those codes with the maximum Nd and non-zero Ns for each right-shift of WJ.
In addition, Nd is utilized to evaluate the detection efficiency of transmitting codes T. A flowchart of the transmitting pulse encoding method is given in Figure 4.
Base on the flowchart, the histogram distribution of total number of effective detection windows Nd with different length are shown as Figure 5a, Figure 6a, Figure 7a and Figure 8a. The set of optimum codes corresponding with the maximum Nd are obtained as Figure 5b, Figure 6b, Figure 7b and Figure 8b. When L = 7, the maximum of total detection window number Nd is 12 shown in Figure 5, and the corresponding number of optimum codes is 35. The minimum of total detection window number Nd is zero and the corresponding number of invalid codes is 1. By contrast, the maximum of Nd with L = 8 is 16 which is larger than Nd with L = 7. However, the corresponding number of optimum codes with L = 8 is only 32 which is less than that with L = 7. Moreover, the number of invalid codes is 8 which is much larger than that with L = 7. Although, the code length L increases by 1 from L = 7 to L = 8 and from an odd number to an adjacent and larger even number, the number of optimum codes not only increased but also decreased. The similar result is indicated in L = 9 and L = 10 shown in Figure 6a and Figure 8a. Hence, the encoding efficiency is highly affected by the code odevity and analyzed in what follows to determine the impact of code length parity on encoding efficiency.
The main calculation procedure is code initialization in step 1, right shift operation in step 2 and exclusive OR operation in step 3. The total number of L bits code is 2(L−1), the right shift number is L − 1 and the exclusive OR operation number is L − 1. Hence, the computational complexity of the encoding method proposed in this paper is O (2N·N2) and N is equal to L − 1. As for the spaceborne SAR, the calculation resource is limited. Hence, the transmitting encoding method is designed as an off-line algorithm to save the on-line calculation resource. Firstly, the optimum codes are obtained in the ground center with great calculation resources. Then, the optimum code is switched into a decimal number because each binary code is corresponding with a decimal number. The decimal number is stored in the spaceborne SAR. Finally, when the code length is determined by Equation (13), a random optimum code with corresponding length is selected from the decimal number.

3.2. Encoding Efficiency Analysis

As mentioned previously, the total number of codes that can be generated from L − 1 bits is 2(L−1). Supposing the number of optimum codes is Nbest, the ratio of Nbest and the total number of codes is defined as encoding factor indicated as follows:
G b = N b e s t 2 L 1
The Nbest and maximum of Nd of different even and odd code length L are shown in Table 1. It is found that the Nd is increasing with code length L regardless the odevity of L. However, the Nbest of odd code length is larger than that of adjacent even code length.
The encoding factors of even and odd codes are shown in Figure 9. It can clearly be seen that the encoding factors of the odd code length are greater than those of the even code length. The encoding factor decreased with the code length. Hence, the optimum codes with even code length are preferred in the beyond-PRT RDJ detection.

3.3. Detection Threshold

The fundamental prerequisite for the RDJ and the beyond-PRT RDJ is that the jamming signal must have enough power to cover or blur the protected target. Accordingly, the energy level of the false target formed by jammer is similar to or smaller than that of the protected target in scene.
After the transmitting pulse encoding as Figure 2 shown, there should not have legitimate target echo pulses and theoretically only have range ambiguity signal in the receiving window corresponding to code element 0. Moreover, the power of the range ambiguity signal is much lower than that of the main lobe power of 20 dB.
The energy of the receiving signal corresponded to code element 1 is utilized as detection threshold. The detection threshold Ath is indicated as follows:
A t h = T ( i ) 1 Y i L
where Yi represents the echoes in the i-th receiving window corresponding the i-th code element in Equation (10). Hence, the detection threshold is the average energy of echoes from the receiving windows which are corresponding with code element 1 in the total code length. If the receiving signal in the effective detection window is beyond the detection threshold, the beyond-PRT RDJ has entered the receiver. Otherwise, there is no beyond-PRT RDJ.

4. Simulation

It is supposed that the satellite is in the nearest Earth orbit with the simulation parameters given in Table 2. The target P is located at the middle point of the scene with coordinates (6336.1, 246.8, 34.7) km and the jammer J is at coordinates (6364.4, 287.3, 40.4) km, specified in geocentric coordinate system (GCS). The slant ranges from the middle point and the jammer to the satellite, RP and RJ, are 728.8 km and 745.4 km respectively.
In a scenario, the jammer forms a false target to cover conceal the protected target at the middle point. The maximum effective range of the jammer is taken to be 1200 km. The sub-satellite range is 600 km. Hence, the code length L is determined to be 7 using (13) and the maximum time delay for the beyond-PRT RDJ is 6 PRTs. When L = 7, the number of optimum codes is 35, as shown in Figure 5. The transmitting code T is [1001010], which is selected from the set of optimum codes and adopted in the simulation. The one dimensional echo signals for each possible time delay, from 1 PRT to 6 PRTs, are shown in Figure 10. The beyond-PRT RDJ signals are included and indicated by the black lines and the target echo signals are indicated by the blue lines. The dashed yellow line indicates the detection threshold and the red rectangles represent the effective detection windows. The time delay of the beyond-PRT RDJ is determined by the relative location of the jammer J and protected target P, which is from one PRT to six PRTs. As Figure 10 shows, the number of effective detection windows is affected by the time delay of the beyond-PRT RDJ signal. Moreover, the effective detection windows exist for each time delay which means the selected optimum code T can continuously detect the beyond-PRT RDJ regardless of the relative location of the jammer J and protected target P. However, the number of effective detection window is different from the time delay of beyond-PRT RDJ. The least effective detection number is 1 when the time delay is 5 PRTs while the most effective detection number is 6 when the time delay is 1 PRT.
In the same simulation parameters, we simulate a scene target image shown in Figure 11a. In a scenario, the time delay of beyond-PRT RDJ is 1 PRT and the jammer forms a false scene target with 5 dB jamming gain. The back scattering characteristics of the scene target is utilized as the false scene. Hence, a lifelike scene target is imported in the SAR image shown in Figure 11b. The image with beyond-PRT RDJ has negative influence on imaging interpretation. The transmitting code T is also utilized to detect the beyond-PRT RDJ in echoes time domain. The simulation result is shown in Figure 12. Echoes in 20 PRTs with transmitting code T is arranged in one dimension. The blue line shows the target echoes and the dark line shows the beyond-PRT RDJ signal.
As shown in Figure 12, the beyond-PRT RDJ is effectively detected in the effective detection window, the red rectangle, since the jamming signal energy is usually analogous to the target signal. Hence, the simulation of both point target and scene target has validated the transmitting pulse encoding method in beyond-PRT RDJ detection in spaceborne SAR.

5. Conclusions

In this paper, the transmitting pulse encoding method is proposed to detect the beyond-PRT RDJ within spaceborne SAR. The jamming signal can be detected as target echoes are received in time-domain without the need for any transforms and the detection area is controllable through the code length. Based on the encoding method, optimum codes are produced and selected with the ability to continuously detect the beyond-PRT RDJ regardless of the relative location of the jammer J and with the most effective detection window. Moreover, the encoding efficiencies of the odd and even codes are analyzed and it is found that the encoding factors of adjacent odd codes is twice that of the adjacent even codes. The simulation results validate the proposed transmitting pulse encoding method. In the future, we will investigate the RDJ detection method in airborne SAR by using transmitting pulse and modulation rate encoding to improve the electromagnetic environment perceiving capability of SAR.

Author Contributions

R.W. designed the method and performed the experiment and simulation and wrote the manuscript; X.W., B.S. and S.C. supervised the study and wrote part of the manuscript.

Acknowledgments

The research is supported in part by the Aeronautical Science Foundation of China (No. 20152096019).

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Breit, H.; Fritz, T.; Balss, U.; Lachaise, M.; Niedermeier, A.; Vonavka, M. TerraSAR-X SAR processing and products. IEEE Trans. Geosci. Remote Sens. 2010, 48, 727–740. [Google Scholar] [CrossRef]
  2. Zhao, B.; Zhou, F.; Bao, Z. Deception jamming for squint SAR based on multiple receivers. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2015, 8, 3988–3998. [Google Scholar] [CrossRef]
  3. Zhao, B.; Zhou, F.; Tao, M.; Zhang, Z.; Bao, Z. Improved method for synthetic aperture radar scattered wave deception jamming. IET Radar Sonar Navig. 2014, 8, 971–976. [Google Scholar] [CrossRef]
  4. Huang, L.; Dong, C.; Shen, Z.; Zhao, G. The influence of rebound jamming on SAR GMTI. IEEE Trans. Geosci. Remote Sens. 2015, 12, 399–403. [Google Scholar] [CrossRef]
  5. Xu, H.; Wu, Z.; Liu, W.; Li, J.; Feng, Q. Analysis of the effect of interference on InSAR. IEEE Sens. J. 2015, 15, 5659–5668. [Google Scholar] [CrossRef]
  6. Zhou, F.; Xing, M.; Bai, X.; Sun, G.; Bao, Z. Narrow-band interference suppression for SAR based on complex empirical mode decomposition. IEEE Trans. Geosci. Remote Sens. 2009, 6, 423–427. [Google Scholar] [CrossRef]
  7. Vu, V.T.; Sjogren, T.K.; Pettersson, M.I.; Hakansson, L.; Gustavsson, A.; Ulander, L.M.H. RFI suppression in ultrawideband SAR using an adaptive line enhancer. IEEE Trans. Geosci. Remote Sens. 2010, 7, 694–698. [Google Scholar] [CrossRef]
  8. Zhou, F.; Tao, M.; Bai, X.; Liu, J. Narrow-band interference suppression for SAR based on independent component analysis. IEEE Trans. Geosci. Remote Sens. 2013, 51, 4952–4960. [Google Scholar] [CrossRef]
  9. Potsis, A.; Reigber, A.; Sutor, T.; Papathanassiou, K.P. A phase preserving method for RF interference suppression in P-band synthetic aperture radar interferometric data. In Proceedings of the IEEE 1999 International, Hamburg, Germany, 28 June–2 July 1999; pp. 2655–2657. [Google Scholar] [CrossRef]
  10. Zhang, S.X.; Xing, M.D.; Guo, R. Interference suppression algorithm for SAR based on time-frequency transform. IEEE Trans. Geosci. Remote Sens. 2011, 49, 3765–3779. [Google Scholar] [CrossRef]
  11. Sergio, B.; Anna, S. Adaptive time-varying cancellation of wideband interference in spread-spectrum communications based on time-frequency distributions. IEEE Trans. Signal Process. 1999, 47, 957–965. [Google Scholar] [CrossRef]
  12. Stankovic, L.J.; Thayaparan, T.; Dakovic, M. Signal decomposition by using the S-method with application to the analysis of HF radar signals in sea-clutter. IEEE Trans. Signal Process. 2006, 54, 4332–4342. [Google Scholar] [CrossRef]
  13. Li, D.; Liu, H.; Yang, L. Efficient time-varying interference suppression method for synthetic aperture radar imaging based on timefrequency reconstruction and mask technique. IET Radar Sonar Navig. 2015, 9, 827–834. [Google Scholar] [CrossRef]
  14. Zhou, F.; Tao, M. Research on methods for narrow-band interference suppression in synthetic aperture radar data. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2015, 8, 3476–3485. [Google Scholar] [CrossRef]
  15. Tao, M.; Zhou, F.; Zhang, Z. Wideband interference mitigation in high-resolution airborne synthetic aperture radar data. IEEE Trans. Geosci. Remote Sens. 2016, 54, 74–87. [Google Scholar] [CrossRef]
  16. Wang, R.; Chen, J.; Wang, X.; Sun, B. High-performance antiretransmission deception jamming utilizing range direction multiple input and multiple output (mimo) synthetic aperture radar (sar). Sensors 2017, 17, 123. [Google Scholar] [CrossRef] [PubMed]
  17. Ferrell, B.H. Interference suppression in UHF synthetic aperture radar. In Algorithms for Synthetic Aperture Radar Imagery II; Lovas, L.A., Ed.; SPIE: Washington, DC, USA, 1995. [Google Scholar] [CrossRef]
  18. Suwa, K.; Wakayama, T. Spatially variant interference suppression method based on superresolution algorithm for synthetic aperture radar. In Algorithms for Synthetic Aperture Radar Imagery XVIII; SPIE: Washington, DC, USA, 2011. [Google Scholar] [CrossRef]
  19. Gebert, N.; Krieger, G. Azimuth phase center adaptation on transmit for high-resolution wide-swath SAR imaging. IEEE Trans. Geosci. Remote Sens. 2009, 6, 782–786. [Google Scholar] [CrossRef]
  20. Huang, P.-P.; Deng, Y.-K.; Xu, W.; Qi, W.-K. The research of multiple-input and multiple-output SAR based on frequency synthetic. J. Electron. Inform. Technol. 2011, 33, 401–406. [Google Scholar] [CrossRef]
  21. Song, X.F.; Willett, P.; Zhou, S.; Luh, P.B. The MIMO radar and jammer games. IEEE Trans. Signal Process. 2012, 60, 687–699. [Google Scholar] [CrossRef]
  22. Ma, X.; Qing, J.; He, Z. Three-channel cancellation of SAR blanketing jamming suppression. Acta Electron. Sin. 2007, 35, 1015–1020. [Google Scholar] [CrossRef]
  23. Wang, H.; Chen, C.; Han, F. A comparative analysis of adaptive beamforming algorithms for satellite multiple-beam antennas. Acta Electron. Sin. 2001, 29, 358–360. [Google Scholar] [CrossRef]
  24. Ciuonzo, D.; De Maio, A.; Orlando, D. A unifying framework for adaptive radar detection in homogeneous plus structured interference—Part II: Detectors design. IEEE Trans. Signal Process. 2016, 64, 2907–2919. [Google Scholar] [CrossRef]
  25. Dong, Y.; Liu, M.; Li, K.; Tang, Z.; Liu, W. Adaptive Direction Detection in Deterministic Interference and Partially Homogeneous Noise. IEEE Signal Process. Lett. 2017, 24, 599–603. [Google Scholar] [CrossRef]
  26. Ciuonzo, D.; De Maio, A.; Orlando, D. On the statistical invariance for adaptive radar detection in partially homogeneous disturbance plus structured interference. IEEE Trans. Signal Process. 2017, 65, 1222–1234. [Google Scholar] [CrossRef]
Figure 1. The beyond-PRT RDJ scenario.
Figure 1. The beyond-PRT RDJ scenario.
Sensors 18 01666 g001
Figure 2. An example of transmitting pulse encoding for beyond-PRT RDJ detection.
Figure 2. An example of transmitting pulse encoding for beyond-PRT RDJ detection.
Sensors 18 01666 g002
Figure 3. The example of transmitting time sequence encoding detection.
Figure 3. The example of transmitting time sequence encoding detection.
Sensors 18 01666 g003
Figure 4. Encoding method flowchart.
Figure 4. Encoding method flowchart.
Sensors 18 01666 g004
Figure 5. L = 7 optimum codes and corresponding Nd (a) histogram distribution of Nd (b) optimum codes.
Figure 5. L = 7 optimum codes and corresponding Nd (a) histogram distribution of Nd (b) optimum codes.
Sensors 18 01666 g005
Figure 6. L = 8 optimum codes and corresponding Nd (a) histogram distribution of Nd (b) optimum codes.
Figure 6. L = 8 optimum codes and corresponding Nd (a) histogram distribution of Nd (b) optimum codes.
Sensors 18 01666 g006
Figure 7. L = 9 optimum codes and corresponding Nd (a) histogram distribution of Nd (b) optimum codes.
Figure 7. L = 9 optimum codes and corresponding Nd (a) histogram distribution of Nd (b) optimum codes.
Sensors 18 01666 g007
Figure 8. L = 10 optimum codes and corresponding Nd (a) histogram distribution of Nd (b) optimum codes.
Figure 8. L = 10 optimum codes and corresponding Nd (a) histogram distribution of Nd (b) optimum codes.
Sensors 18 01666 g008
Figure 9. Encoding factors of odd and even codes.
Figure 9. Encoding factors of odd and even codes.
Sensors 18 01666 g009
Figure 10. Simulation of beyond-PRT RDJ detection in one dimensional echo, for various time delays of (a) 1 PRT; (b) 2 PRTs, (c) 3 PRTs, (d) 4 PRTs, (e) 5 PRTs, (f) 6 PRTs.
Figure 10. Simulation of beyond-PRT RDJ detection in one dimensional echo, for various time delays of (a) 1 PRT; (b) 2 PRTs, (c) 3 PRTs, (d) 4 PRTs, (e) 5 PRTs, (f) 6 PRTs.
Sensors 18 01666 g010
Figure 11. A scene target image, (a) target image without RDJ; (b) target image with RDJ.
Figure 11. A scene target image, (a) target image without RDJ; (b) target image with RDJ.
Sensors 18 01666 g011
Figure 12. Simulation of beyond-PRT RDJ detection in one dimensional echo of a scene target.
Figure 12. Simulation of beyond-PRT RDJ detection in one dimensional echo of a scene target.
Sensors 18 01666 g012
Table 1. Number of optimum codes and Maximum detection window number in different code length.
Table 1. Number of optimum codes and Maximum detection window number in different code length.
OddEven
LNdNbestLNdNbest
5610699
7123581632
9201261025125
11304621236450
1342171614491715
1556643516646400
177224,310188124,300
199092,3782010092,250
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParameterValue
Orbit Height680 km
Eccentricity0.01
Orbit Inclination98
Pitch Angle20°
Incident Angle23.8°
PRF2000 Hz
Band Width50 MHz

Share and Cite

MDPI and ACS Style

Wang, R.; Bing, S.; Wang, X.; Cheng, S. Transmitting Pulse Encoding for Beyond-PRT Retransmitting Deception Jamming Detection in Spaceborne Synthetic Aperture Radar (SAR). Sensors 2018, 18, 1666. https://doi.org/10.3390/s18051666

AMA Style

Wang R, Bing S, Wang X, Cheng S. Transmitting Pulse Encoding for Beyond-PRT Retransmitting Deception Jamming Detection in Spaceborne Synthetic Aperture Radar (SAR). Sensors. 2018; 18(5):1666. https://doi.org/10.3390/s18051666

Chicago/Turabian Style

Wang, Ruijia, Sun Bing, Xing Wang, and Siyi Cheng. 2018. "Transmitting Pulse Encoding for Beyond-PRT Retransmitting Deception Jamming Detection in Spaceborne Synthetic Aperture Radar (SAR)" Sensors 18, no. 5: 1666. https://doi.org/10.3390/s18051666

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop